filePluralsight-CompTIA-Secu-1oK7u

Pluralsight CompTIA Security Plus SY0 Compliance And Operational Security
  • MP401. Risk and Related Concepts\\/01_01-Module Overview.mp48.50MB
  • MP401. Risk and Related Concepts\\/01_02-The Security Cycle.mp45.90MB
  • MP401. Risk and Related Concepts\\/01_03-Control Types.mp419.83MB
  • MP401. Risk and Related Concepts\\/01_04-Incident Response.mp411.78MB
  • MP401. Risk and Related Concepts\\/01_05-False Positives False Negatives and Security Policies.mp421.53MB
  • MP401. Risk and Related Concepts\\/01_06-Risk Calculation.mp419.56MB
  • MP401. Risk and Related Concepts\\/01_07-MTTF MTTR and MTBF.mp47.27MB
  • MP401. Risk and Related Concepts\\/01_08-Threat Vectors Vulnerabilities and naging Risk.mp411.80MB
  • MP401. Risk and Related Concepts\\/01_09-Risk oidance and Risks Associated With Cloud Computing.mp49.47MB
  • MP401. Risk and Related Concepts\\/01_10-RPO and RTO.mp411.65MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_01-Course Overview and Onboarding Process.mp46.74MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_02-3rd Party Integration.mp44.26MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_03-OffBoarding Process.mp42.31MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_04-Social Media Networks and Applications.mp44.04MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_05-SLA.mp43.92MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_06-BPA.mp41.09MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_07-MOU and ISA.mp46.39MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_08-Privacy Considerations and Data Ownership.mp47.24MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_09-Data Backups.mp42.27MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_10-Security Policies and Procedures.mp43.40MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_11-Review Agreements and Verify Compliance.mp44.42MB
  • MP403. Risk Mitigation Strategies\\/03_01-Module Overview.mp41.92MB
  • MP403. Risk Mitigation Strategies\\/03_02-Change nagement.mp418.40MB
  • MP403. Risk Mitigation Strategies\\/03_03-Incident nagement.mp44.87MB
  • MP403. Risk Mitigation Strategies\\/03_04-User Rights and Permissions Review.mp46.72MB
  • MP403. Risk Mitigation Strategies\\/03_05-Perform Routine Audits.mp42.14MB
  • MP403. Risk Mitigation Strategies\\/03_06-Preventing Data Loss or Theft.mp43.43MB
  • MP403. Risk Mitigation Strategies\\/03_07-Attack Vectors.mp42.77MB
  • MP403. Risk Mitigation Strategies\\/03_08-Enforce Technology Controls.mp46.07MB
  • MP403. Risk Mitigation Strategies\\/03_09-Module Review.mp41.42MB
  • MP404. Implementing Basic Forensic Procedures\\/04_01-Module Overview.mp42.67MB
  • MP404. Implementing Basic Forensic Procedures\\/04_02-What Is Computer Forensics.mp45.45MB
  • MP404. Implementing Basic Forensic Procedures\\/04_03-Order of Volatility.mp411.85MB
  • MP404. Implementing Basic Forensic Procedures\\/04_04-First Responder Best Practices.mp410.93MB
  • MP404. Implementing Basic Forensic Procedures\\/04_05-Capture a System Ige.mp49.13MB
  • MP404. Implementing Basic Forensic Procedures\\/04_06-Network Traffic and Logs.mp49.62MB
  • MP404. Implementing Basic Forensic Procedures\\/04_07-Capture Video.mp41.99MB
  • MP404. Implementing Basic Forensic Procedures\\/04_08-Record Time Offset.mp46.01MB
  • MP404. Implementing Basic Forensic Procedures\\/04_09-Take Hashes.mp412.97MB
  • MP404. Implementing Basic Forensic Procedures\\/04_10-Screenshots.mp42.84MB
  • MP404. Implementing Basic Forensic Procedures\\/04_11-Witnesses.mp44.50MB
  • MP404. Implementing Basic Forensic Procedures\\/04_12-Track n Hours and Expense.mp46.58MB
  • MP404. Implementing Basic Forensic Procedures\\/04_13-Chain of Custody.mp47.47MB
  • MP404. Implementing Basic Forensic Procedures\\/04_14-Big Data Analysis.mp48.25MB
  • MP404. Implementing Basic Forensic Procedures\\/04_15-Module Review.mp42.57MB
  • MP405. Incident Response Concepts\\/05_01-Module Overview.mp43.56MB
  • MP405. Incident Response Concepts\\/05_02-Incident Preparation.mp417.36MB
  • MP405. Incident Response Concepts\\/05_03-Incident Identification.mp44.26MB
  • MP405. Incident Response Concepts\\/05_05-Incident Notification and Escalation.mp49.43MB
  • MP405. Incident Response Concepts\\/05_06-Incident Mitigation and Isolation.mp47.67MB
  • MP405. Incident Response Concepts\\/05_07-Lessons Learned.mp43.37MB
  • MP405. Incident Response Concepts\\/05_08-Incident Reporting.mp47.41MB
  • MP405. Incident Response Concepts\\/05_09-Recovery and Reconstitution Procedures.mp42.51MB
  • MP405. Incident Response Concepts\\/05_10-First Responder.mp43.21MB
  • MP405. Incident Response Concepts\\/05_11-Incident Isolation.mp47.34MB
  • MP405. Incident Response Concepts\\/05_12-Data Breach.mp49.01MB
  • MP405. Incident Response Concepts\\/05_13-Dage and Loss Control.mp45.02MB
  • MP405. Incident Response Concepts\\/05_14-Module Review.mp41.76MB
  • MP406. Security Related Awareness and Training\\/06_01-Module Overview.mp42.33MB
  • MP406. Security Related Awareness and Training\\/06_02-Security Policy Training and Procedures.mp46.22MB
  • MP406. Security Related Awareness and Training\\/06_03-Validate Compliance and Security Posture.mp42.08MB
  • MP406. Security Related Awareness and Training\\/06_04-Role ba<x>sed Training.mp42.54MB
  • MP406. Security Related Awareness and Training\\/06_05-Personally Identifiable Infortion.mp43.16MB
  • MP406. Security Related Awareness and Training\\/06_06-Infortion Classification.mp44.05MB
  • MP406. Security Related Awareness and Training\\/06_07-Data Labeling Handling and Disposal.mp47.78MB
  • MP406. Security Related Awareness and Training\\/06_08-Compliance.mp48.46MB
  • MP406. Security Related Awareness and Training\\/06_09-User Habits.mp417.18MB
  • MP406. Security Related Awareness and Training\\/06_10-New Threats Security Trends and Alerts.mp46.22MB
  • MP406. Security Related Awareness and Training\\/06_11-Use of Social Networking and P2P.mp46.12MB
  • MP406. Security Related Awareness and Training\\/06_12-Module Review.mp43.04MB
  • MP407. Physical and Environmental Controls\\/07_01-Module Overview.mp42.62MB
  • MP407. Physical and Environmental Controls\\/07_02-Environmental Factors.mp43.12MB
  • MP407. Physical and Environmental Controls\\/07_03-HVAC.mp45.45MB
  • MP407. Physical and Environmental Controls\\/07_04-Fire Suppression.mp48.37MB
  • MP407. Physical and Environmental Controls\\/07_05-EMI Shielding.mp45.83MB
  • MP407. Physical and Environmental Controls\\/07_06-Hot and Cold Aisles.mp46.74MB
  • MP407. Physical and Environmental Controls\\/07_07-Environmental Monitoring.mp43.97MB
  • MP407. Physical and Environmental Controls\\/07_08-Temperature and Humidity Controls.mp43.87MB
  • MP407. Physical and Environmental Controls\\/07_09-Physical Security Locks ntraps and Video Surveillance.mp48.55MB
  • MP407. Physical and Environmental Controls\\/07_10-Fencing.mp45.45MB
  • MP407. Physical and Environmental Controls\\/07_11-Proximity Readers and Access Lists.mp45.97MB
  • MP407. Physical and Environmental Controls\\/07_12-Proper Lighting and Signs.mp45.63MB
  • MP407. Physical and Environmental Controls\\/07_13-Barricades.mp42.18MB
  • MP407. Physical and Environmental Controls\\/07_14-Biometrics.mp41.98MB
  • MP407. Physical and Environmental Controls\\/07_15-Protected Distribution Systems.mp410.88MB
  • MP407. Physical and Environmental Controls\\/07_16-Alarms and Motion Detection.mp44.60MB
  • MP407. Physical and Environmental Controls\\/07_17-Control Types.mp49.46MB
  • MP408. Risk nagement Best Practices\\/08_01-Module Overview.mp42.87MB
  • MP408. Risk nagement Best Practices\\/08_02-Business Continuity Concepts.mp45.27MB
  • MP408. Risk nagement Best Practices\\/08_03-Business Impact Analysis.mp47.31MB
  • MP408. Risk nagement Best Practices\\/08_04-Identification of Critical Systems and Components.mp43.17MB
  • MP408. Risk nagement Best Practices\\/08_05-Removing Single Points of Failure.mp43.59MB
  • MP408. Risk nagement Best Practices\\/08_06-Business Continuity Planning and Testing.mp46.79MB
  • MP408. Risk nagement Best Practices\\/08_07-Risk Assesent and Continuity of Operations.mp46.03MB
  • MP408. Risk nagement Best Practices\\/08_08-Disaster Recovery Planning.mp48.49MB
  • MP408. Risk nagement Best Practices\\/08_09-IT Contingency Planning.mp45.48MB
  • MP408. Risk nagement Best Practices\\/08_10-Succession Planning.mp42.92MB
  • MP408. Risk nagement Best Practices\\/08_11-High ailability.mp47.80MB
  • MP408. Risk nagement Best Practices\\/08_12-Redundancy.mp48.42MB
  • MP408. Risk nagement Best Practices\\/08_13-Table Exercises.mp46.81MB
  • MP408. Risk nagement Best Practices\\/08_14-Fault Tolerance.mp44.18MB
  • MP408. Risk nagement Best Practices\\/08_15-RAID.mp411.29MB
  • MP408. Risk nagement Best Practices\\/08_16-Clustering.mp43.82MB
  • MP408. Risk nagement Best Practices\\/08_17-Load Balancing.mp43.61MB
  • MP408. Risk nagement Best Practices\\/08_18-Servers.mp41.66MB
  • MP408. Risk nagement Best Practices\\/08_19-Backup Plans Execution and Frequency.mp47.79MB
  • MP408. Risk nagement Best Practices\\/08_20-Hot Warm and Cold Sites.mp411.94MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_01-Module Overview.mp44.31MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_02-Encryption.mp46.74MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_03-Access Controls.mp41.72MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_04-Steganography.mp418.24MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_05-Digital Signatures.mp45.51MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_06-Certificates.mp47.35MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_07-ailability Redundancy Fault Tolerance and Patching.mp47.36MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_08-Safety.mp43.90MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_09-Lighting.mp42.33MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_10-Locks.mp41.30MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_11-.mp41.87MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_12-Escape Plans Escape Routes and Drills.mp44.41MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_13-Testing Controls.mp43.12MB
  • ZIPExercise Files\\/comptiasecurityplussy0401complianceoperationalsecurity.zip29.13MB
Latest Search: 1.SOE-833   2.ARM-113   3.MVBD-010   4.OPBD-051   5.RKI-185   6.FTA-176   7.SBB-118   8.HITMA-69   9.GOD-061   10.CHHT-010   11.UMD-323   12.IDBD-332   13.DAPS-074   14.DOKS-277   15.ID-21028   16.BOMN-041   17.ASFB-010   18.DMBA-135   19.MOBSP-006   20.ONSD-566   21.ERDV-164   22.ONSD-614   23.RCT-483   24.JUSD-433   25.IDBD-229   26.RKI-173   27.MIBD-572   28.ONSD-376   29.ONSD-379   30.AMD-216   31.GOD-124   32.JUSD-347   33.IDBD-087   34.JUSD-401   35.ONSD-421   36.ONSD-590   37.KRBV-053   38.ONSD-391   39.BOBB-143   40.CAGC-001   41.MOLD-14   42.CRPD-230   43.CC-132   44.RKI-251   45.ARMG-067   46.LBOY-001   47.MADV-183   48.OPBD-092   49.SDMT-766   50.AAJB-006   51.MGMF-002   52.DDB-220   53.RKI-185   54.CADV-346   55.SMD-30   56.KYWX-001   57.NADE-043   58.VSPDS-219   59.MBD-003   60.T28-203   61.DVH-380   62.M-447   63.M-528   64.KA-1363   65.BNDV-775   66.GPS-263   67.MA-329   68.GESD-147   69.SEA-350   70.NBRD-007   71.153   72.479   73.04   74.11   75.014   76.040   77.048   78.567   79.041   80.022   81.277   82.024   83.200   84.227   85.761   86.014   87.579   88.202   89.543   90.003   91.038   92.042   93.377   94.605   95.713   96.421   97.223   98.525   99.030   100.002   101.85   102.315   103.466   104.029   105.001   106.201   107.161   108.172   109.569   110.28   111.19   112.006   113.31   114.78   115.093   116.136   117.104   118.328   119.199   120.234   121.002   122.352   123.467   124.090   125.121   126.178   127.0046   128.01   129.043   130.033   131.0005   132.021   133.102   134.0   135.001   136.002   137.444   138.612   139.817   140.781